mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			163 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			163 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2018 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
// Package app implements a server that runs a set of active
 | 
						|
// components.  This includes node controllers, service and
 | 
						|
// route controller, and so on.
 | 
						|
//
 | 
						|
package app
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"net"
 | 
						|
	"net/http"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	cloudprovider "k8s.io/cloud-provider"
 | 
						|
	"k8s.io/klog"
 | 
						|
	cloudcontrollerconfig "k8s.io/kubernetes/cmd/cloud-controller-manager/app/config"
 | 
						|
	cloudcontrollers "k8s.io/kubernetes/pkg/controller/cloud"
 | 
						|
	routecontroller "k8s.io/kubernetes/pkg/controller/route"
 | 
						|
	servicecontroller "k8s.io/kubernetes/pkg/controller/service"
 | 
						|
	netutils "k8s.io/utils/net"
 | 
						|
 | 
						|
	utilfeature "k8s.io/apiserver/pkg/util/feature"
 | 
						|
	kubefeatures "k8s.io/kubernetes/pkg/features"
 | 
						|
)
 | 
						|
 | 
						|
func startCloudNodeController(ctx *cloudcontrollerconfig.CompletedConfig, cloud cloudprovider.Interface, stopCh <-chan struct{}) (http.Handler, bool, error) {
 | 
						|
	// Start the CloudNodeController
 | 
						|
	nodeController, err := cloudcontrollers.NewCloudNodeController(
 | 
						|
		ctx.SharedInformers.Core().V1().Nodes(),
 | 
						|
		// cloud node controller uses existing cluster role from node-controller
 | 
						|
		ctx.ClientBuilder.ClientOrDie("node-controller"),
 | 
						|
		cloud,
 | 
						|
		ctx.ComponentConfig.NodeStatusUpdateFrequency.Duration,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		klog.Warningf("failed to start cloud node controller: %s", err)
 | 
						|
		return nil, false, nil
 | 
						|
	}
 | 
						|
 | 
						|
	go nodeController.Run(stopCh)
 | 
						|
 | 
						|
	return nil, true, nil
 | 
						|
}
 | 
						|
 | 
						|
func startCloudNodeLifecycleController(ctx *cloudcontrollerconfig.CompletedConfig, cloud cloudprovider.Interface, stopCh <-chan struct{}) (http.Handler, bool, error) {
 | 
						|
	// Start the cloudNodeLifecycleController
 | 
						|
	cloudNodeLifecycleController, err := cloudcontrollers.NewCloudNodeLifecycleController(
 | 
						|
		ctx.SharedInformers.Core().V1().Nodes(),
 | 
						|
		// cloud node lifecycle controller uses existing cluster role from node-controller
 | 
						|
		ctx.ClientBuilder.ClientOrDie("node-controller"),
 | 
						|
		cloud,
 | 
						|
		ctx.ComponentConfig.KubeCloudShared.NodeMonitorPeriod.Duration,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		klog.Warningf("failed to start cloud node lifecycle controller: %s", err)
 | 
						|
		return nil, false, nil
 | 
						|
	}
 | 
						|
 | 
						|
	go cloudNodeLifecycleController.Run(stopCh)
 | 
						|
 | 
						|
	return nil, true, nil
 | 
						|
}
 | 
						|
 | 
						|
func startServiceController(ctx *cloudcontrollerconfig.CompletedConfig, cloud cloudprovider.Interface, stopCh <-chan struct{}) (http.Handler, bool, error) {
 | 
						|
	// Start the service controller
 | 
						|
	serviceController, err := servicecontroller.New(
 | 
						|
		cloud,
 | 
						|
		ctx.ClientBuilder.ClientOrDie("service-controller"),
 | 
						|
		ctx.SharedInformers.Core().V1().Services(),
 | 
						|
		ctx.SharedInformers.Core().V1().Nodes(),
 | 
						|
		ctx.ComponentConfig.KubeCloudShared.ClusterName,
 | 
						|
	)
 | 
						|
	if err != nil {
 | 
						|
		// This error shouldn't fail. It lives like this as a legacy.
 | 
						|
		klog.Errorf("Failed to start service controller: %v", err)
 | 
						|
		return nil, false, nil
 | 
						|
	}
 | 
						|
 | 
						|
	go serviceController.Run(stopCh, int(ctx.ComponentConfig.ServiceController.ConcurrentServiceSyncs))
 | 
						|
 | 
						|
	return nil, true, nil
 | 
						|
}
 | 
						|
 | 
						|
func startRouteController(ctx *cloudcontrollerconfig.CompletedConfig, cloud cloudprovider.Interface, stopCh <-chan struct{}) (http.Handler, bool, error) {
 | 
						|
	if !ctx.ComponentConfig.KubeCloudShared.AllocateNodeCIDRs || !ctx.ComponentConfig.KubeCloudShared.ConfigureCloudRoutes {
 | 
						|
		klog.Infof("Will not configure cloud provider routes for allocate-node-cidrs: %v, configure-cloud-routes: %v.", ctx.ComponentConfig.KubeCloudShared.AllocateNodeCIDRs, ctx.ComponentConfig.KubeCloudShared.ConfigureCloudRoutes)
 | 
						|
		return nil, false, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// If CIDRs should be allocated for pods and set on the CloudProvider, then start the route controller
 | 
						|
	routes, ok := cloud.Routes()
 | 
						|
	if !ok {
 | 
						|
		klog.Warning("configure-cloud-routes is set, but cloud provider does not support routes. Will not configure cloud provider routes.")
 | 
						|
		return nil, false, nil
 | 
						|
	}
 | 
						|
 | 
						|
	// failure: bad cidrs in config
 | 
						|
	clusterCIDRs, dualStack, err := processCIDRs(ctx.ComponentConfig.KubeCloudShared.ClusterCIDR)
 | 
						|
	if err != nil {
 | 
						|
		return nil, false, err
 | 
						|
	}
 | 
						|
 | 
						|
	// failure: more than one cidr and dual stack is not enabled
 | 
						|
	if len(clusterCIDRs) > 1 && !utilfeature.DefaultFeatureGate.Enabled(kubefeatures.IPv6DualStack) {
 | 
						|
		return nil, false, fmt.Errorf("len of ClusterCIDRs==%v and dualstack feature is not enabled", len(clusterCIDRs))
 | 
						|
	}
 | 
						|
 | 
						|
	// failure: more than one cidr but they are not configured as dual stack
 | 
						|
	if len(clusterCIDRs) > 1 && !dualStack {
 | 
						|
		return nil, false, fmt.Errorf("len of ClusterCIDRs==%v and they are not configured as dual stack (at least one from each IPFamily", len(clusterCIDRs))
 | 
						|
	}
 | 
						|
 | 
						|
	// failure: more than cidrs is not allowed even with dual stack
 | 
						|
	if len(clusterCIDRs) > 2 {
 | 
						|
		return nil, false, fmt.Errorf("length of clusterCIDRs is:%v more than max allowed of 2", len(clusterCIDRs))
 | 
						|
	}
 | 
						|
 | 
						|
	routeController := routecontroller.New(
 | 
						|
		routes,
 | 
						|
		ctx.ClientBuilder.ClientOrDie("route-controller"),
 | 
						|
		ctx.SharedInformers.Core().V1().Nodes(),
 | 
						|
		ctx.ComponentConfig.KubeCloudShared.ClusterName,
 | 
						|
		clusterCIDRs,
 | 
						|
	)
 | 
						|
	go routeController.Run(stopCh, ctx.ComponentConfig.KubeCloudShared.RouteReconciliationPeriod.Duration)
 | 
						|
 | 
						|
	return nil, true, nil
 | 
						|
}
 | 
						|
 | 
						|
// processCIDRs is a helper function that works on a comma separated cidrs and returns
 | 
						|
// a list of typed cidrs
 | 
						|
// a flag if cidrs represents a dual stack
 | 
						|
// error if failed to parse any of the cidrs
 | 
						|
func processCIDRs(cidrsList string) ([]*net.IPNet, bool, error) {
 | 
						|
	cidrsSplit := strings.Split(strings.TrimSpace(cidrsList), ",")
 | 
						|
 | 
						|
	cidrs, err := netutils.ParseCIDRs(cidrsSplit)
 | 
						|
	if err != nil {
 | 
						|
		return nil, false, err
 | 
						|
	}
 | 
						|
 | 
						|
	// if cidrs has an error then the previous call will fail
 | 
						|
	// safe to ignore error checking on next call
 | 
						|
	dualstack, _ := netutils.IsDualStackCIDRs(cidrs)
 | 
						|
 | 
						|
	return cidrs, dualstack, nil
 | 
						|
}
 |